id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
listlengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2023:1931
Red Hat Security Advisory: emacs security update
emacs: command injection vulnerability in org-mode
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/o:redhat:rhel_eus:8.6::baseos" ]
null
7.8
null
null
RHSA-2024:9051
Red Hat Security Advisory: podman security update
Buildah: Podman: Improper Input Validation in bind-propagation Option of Dockerfile RUN --mount Instruction buildah: Buildah allows arbitrary directory mount Podman: Buildah: CRI-O: symlink traversal vulnerability in the containers/storage library can cause Denial of Service (DoS)
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
6.5
null
null
RHSA-2005:092
Red Hat Security Advisory: kernel security update
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2023:3809
Red Hat Security Advisory: Red Hat build of Quarkus 2.13.8 release and security update
apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider quarkus: insecure permissions on temp files quarkus-oidc: ID and access tokens leak via the authorization code flow quarkus-core: TLS protocol configured with quarkus.http.ssl.protocols is not enforced, client can enforce weaker supported TLS protocol graphql-java: crafted GraphQL query causes stack consumption
[ "cpe:/a:redhat:quarkus:2.13::el8" ]
null
7.5
null
null
RHSA-2016:1847
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: netfilter: missing bounds check in ipt_entry structure kernel: compat IPT_SO_SET_REPLACE setsockopt kernel: out of bounds reads when processing IPT_SO_SET_REPLACE setsockopt kernel: overlayfs: missing upper dentry verification before unlink and rename kernel: vfs: missing detection of hardlinks in vfs_rename() on overlayfs
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.5
null
RHSA-2016:1601
Red Hat Security Advisory: rh-mysql56-mysql security update
mysql: unspecified vulnerability in subcomponent: Server: InnoDB (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: Parser (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: FTS (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: Types (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: Security: Encryption (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: Privileges (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: RBR (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU October 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU October 2016) mysql: unspecified vulnerability in subcomponent: Server: InnoDB (CPU October 2016) mysql: unspecified vulnerability in subcomponent: Server: InnoDB (CPU October 2016) mysql: unspecified vulnerability in subcomponent: Server: Replication (CPU October 2016) mysql: unspecified vulnerability in subcomponent: Server: InnoDB Plugin (CPU October 2016)
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
3.1
null
RHSA-2023:4030
Red Hat Security Advisory: grafana security update
grafana: account takeover possible when using Azure AD OAuth
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
9.8
null
null
RHSA-2024:3496
Red Hat Security Advisory: OpenShift Container Platform 4.13.43 security update
cri-o: Arbitrary command injection via pod annotation
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9" ]
null
7.2
null
null
RHSA-2023:3585
Red Hat Security Advisory: python3.11 security update
python: urllib.parse url blocklisting bypass
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.5
null
null
RHBA-2017:1991
Red Hat Bug Fix Advisory: libtirpc bug fix update
libtirpc: Segmentation fault in makefd_xprt return value in svc_vc.c
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.3
null
RHSA-2023:5269
Red Hat Security Advisory: postgresql:15 security update
postgresql: schema_element defeats protective search_path changes postgresql: row security policies disregard user ID changes after inlining.
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
4.2
null
null
RHSA-2018:1686
Red Hat Security Advisory: qemu-kvm-rhev security update
hw: cpu: speculative store bypass
[ "cpe:/a:redhat:openstack:7::el7" ]
null
null
5.6
null
RHSA-2009:0315
Red Hat Security Advisory: firefox security update
libpng arbitrary free() flaw Firefox 3 Layout Engine Crashes Firefox 2 and 3 - Layout engine crashes Firefox 3 crashes in the JavaScript engine Firefox 2 and 3 crashes in the JavaScript engine Firefox XUL Linked Clones Double Free Vulnerability Firefox XML data theft via RDFXMLDataSource and cross-domain redirect Firefox URL spoofing with invisible control characters
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2022:6170
Red Hat Security Advisory: rsync security update
rsync: remote arbitrary files write inside the directories of connecting peers
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.4
null
null
RHSA-2024:4566
Red Hat Security Advisory: OpenJDK 11.0.24 Security Update for Portable Linux Builds
OpenJDK: potential UTF8 size overflow (8314794) OpenJDK: Excessive symbol length can lead to infinite loop (8319859) OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548) OpenJDK: Pack200 increase loading time due to improper header validation (8322106) OpenJDK: Out-of-bounds access in 2D image handling (8324559) OpenJDK: RangeCheckElimination array index overflow (8323231)
[ "cpe:/a:redhat:openjdk:11" ]
null
7.4
null
null
RHSA-2010:0602
Red Hat Security Advisory: Red Hat Certificate System 7.3 security update
tomcat multiple content-length header poisioning tomcat DoS tomcat directory listing issue httpd: Expect header XSS httpd mod_status XSS tomcat directory traversal mod_perl PerlRun denial of service tomcat accept-language xss flaw httpd mod_cache segfault httpd scoreboard lack of PID protection tomcat handling of cookies tomcat handling of cookie values httpd: out of bounds read mod_autoindex XSS httpd: mod_imagemap XSS perl regular expression UTF parsing errors Improve cookie parsing for tomcat5 Absolute path traversal Apache Tomcat WEBDAV apache mod_status cross-site scripting mod_proxy_ftp XSS tomcat5 SSO cookie login information disclosure tomcat: Cross-Site-Scripting enabled by sendError call perl: heap corruption by regular expressions with utf8 characters httpd: mod_proxy_http DoS via excessive interim responses from the origin server tomcat RequestDispatcher information disclosure vulnerability httpd: mod_proxy_ftp globbing XSS tomcat request dispatcher information disclosure vulnerability apr-util heap buffer underwrite tomcat6 Denial-Of-Service with AJP connection tomcat6 Information disclosure in authentication classes httpd: possible temporary DoS (CPU consumption) in mod_deflate apr-util billion laughs attack apr-util single NULL byte buffer overflow apr-util: Integer overflows in memory pool (apr) and relocatable memory (apr-util) management httpd: NULL pointer defer in mod_proxy_ftp caused by crafted EPSV and PASV reply httpd: mod_proxy_ftp FTP command injection via Authorization HTTP header pcsc-lite: Privilege escalation via specially-crafted client to PC/SC Smart Card daemon messages pcsc-lite: Privilege escalation via specially-crafted client to PC/SC Smart Card daemon messages httpd: request header information leak
[ "cpe:/a:redhat:certificate_system:7.3" ]
null
null
null
null
RHSA-2022:5754
Red Hat Security Advisory: OpenJDK 8u342 security update for Portable Linux Builds
OpenJDK: class compilation issue (Hotspot, 8281859) OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
[ "cpe:/a:redhat:openjdk:1.8" ]
null
7.5
null
null
RHSA-2004:615
Red Hat Security Advisory: libxml2 security update
libxml2 various overflows
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2016:2605
Red Hat Security Advisory: util-linux security, bug fix, and enhancement update
util-linux: Extended partition loop in MBR partition table leads to DOS
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
4.6
null
RHSA-2013:1286
Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.0.0 patch 3
Console: Stored cross-site scripting (XSS)
[ "cpe:/a:redhat:jboss_amq:6.0.0", "cpe:/a:redhat:jboss_fuse:6.0.0" ]
null
null
null
null
RHSA-2024:6878
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.11 security update on RHEL 7
keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak Keycloak: Vulnerable Redirect URI Validation Results in Open Redirec
[ "cpe:/a:redhat:red_hat_single_sign_on:7.6::el7" ]
null
6.1
null
null
RHSA-2021:4585
Red Hat Security Advisory: gcc-toolset-10-gcc security update
environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
8.5
null
null
RHSA-2024:6268
Red Hat Security Advisory: kernel-rt security update
kernel: kprobes/x86: Use copy_from_kernel_nofault() to read from unsafe address kernel: netfilter: bridge: replace physindev with physinif in nf_bridge_info kernel: x86/coco: Require seeding RNG with RDRAND on CoCo systems kernel: bpf, sockmap: Prevent lock inversion deadlock in map delete elem kernel: bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq kernel: gfs2: Fix potential glock use-after-free on unmount kernel: ionic: fix use after netif_napi_del() kernel: mm/huge_memory: don't unpoison huge_zero_folio kernel: dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list kernel: scsi: qedi: Fix crash while reading debugfs attribute kernel: tipc: force a dst refcount before doing decryption kernel: ppp: reject claimed-as-LCP but actually malformed packets kernel: Revert "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" kernel: mm: avoid overflows in dirty throttling logic
[ "cpe:/a:redhat:rhel_eus:9.2::nfv", "cpe:/a:redhat:rhel_eus:9.2::realtime" ]
null
4.4
null
null
RHSA-2024:1538
Red Hat Security Advisory: OpenShift Container Platform 4.12 low-latency extras security update
golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON
[ "cpe:/a:redhat:openshift:4.12::el8" ]
null
5.9
null
null
RHSA-2020:0850
Red Hat Security Advisory: python-pip security update
python-requests: Redirect from HTTPS to HTTP does not remove Authorization header python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service python-urllib3: Certification mishandle when error should be thrown
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.5
null
RHSA-2024:4517
Red Hat Security Advisory: firefox security update
Mozilla: Race condition in permission assignment Mozilla: Memory corruption in thread creation Mozilla: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13, and Thunderbird 115.13
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2024:4001
Red Hat Security Advisory: thunderbird security update
Mozilla: Use-after-free in JavaScript object transplant Mozilla: External protocol handlers leaked by timing attack Mozilla: Sandboxed iframes were able to bypass sandbox restrictions to open a new window Mozilla: Cross-Origin Image leak via Offscreen Canvas Mozilla: Memory Corruption in Text Fragments Mozilla: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 Mozilla: Use-after-free in networking
[ "cpe:/a:redhat:rhel_aus:8.2::appstream" ]
null
7.5
null
null
RHSA-2024:10933
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.20 Security update
undertow: information leakage via HTTP/2 request header reuse
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4" ]
null
0
null
null
RHSA-2014:1297
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.3 openssl security update
openssl: DTLS packet processing double free openssl: DTLS memory exhaustion openssl: information leak in pretty printing functions openssl: DTLS anonymous (EC)DH denial of service
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6.3" ]
null
null
null
null
RHSA-2024:8675
Red Hat Security Advisory: buildah security update
buildah: Buildah allows arbitrary directory mount
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
7.8
null
null
RHSA-2024:1812
Red Hat Security Advisory: Custom Metrics Autoscaler Operator for Red Hat OpenShift 2.12.1-376 Bug Fixes
golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics jose-go: improper handling of highly compressed data
[ "cpe:/a:redhat:openshift_custom_metrics_autoscaler:2.0::el8" ]
null
4.3
null
null
RHSA-2020:2366
Red Hat Security Advisory: Red Hat support for Spring Boot 2.1.12 security and bug fix update
tomcat: Apache Tomcat HTTP/2 DoS keycloak: session hijack using the user access token keycloak: missing signatures validation on CRL used to verify client certificates keycloak: CSRF check missing in My Resources functionality in the Account Console keycloak: SAML broker does not check existence of signature on document allowing any user impersonation keycloak: cross-realm user access auth bypass
[ "cpe:/a:redhat:openshift_application_runtimes:1.0" ]
null
null
5
null
RHSA-2023:0113
Red Hat Security Advisory: postgresql:10 security update
postgresql: Extension scripts replace objects not belonging to the extension.
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.1
null
null
RHSA-2009:1549
Red Hat Security Advisory: wget security update
wget: incorrect verification of SSL certificate with NUL in name
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2018:2095
Red Hat Security Advisory: patch security update
patch: Malicious patch files cause ed to execute arbitrary commands
[ "cpe:/o:redhat:rhel_aus:6.6::server", "cpe:/o:redhat:rhel_tus:6.6::server" ]
null
null
7.8
null
RHSA-2023:0203
Red Hat Security Advisory: java-1.8.0-openjdk security and bug fix update
OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) OpenJDK: soundbank URL remote loading (Sound, 8293742)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
3.7
null
null
RHSA-2023:5353
Red Hat Security Advisory: libtiff security update
libtiff: out-of-bounds write in extractContigSamplesShifted16bits() in tools/tiffcrop.c libtiff: out-of-bounds write in _TIFFmemcpy() in libtiff/tif_unix.c when called by functions in tools/tiffcrop.c libtiff: out-of-bounds write in extractContigSamplesShifted32bits() in tools/tiffcrop.c libtiff: out-of-bounds write in extractContigSamplesShifted16bits() in tools/tiffcrop.c libtiff: out-of-bounds write in extractContigSamplesShifted24bits() in tools/tiffcrop.c
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
6.1
null
null
RHSA-2021:0943
Red Hat Security Advisory: Red Hat build of Eclipse Vert.x 4.0.3 security update
netty: Information disclosure via the local system temporary directory netty: possible request smuggling in HTTP/2 due missing validation
[ "cpe:/a:redhat:openshift_application_runtimes:1.0" ]
null
5.9
null
null
RHSA-2020:1940
Red Hat Security Advisory: OpenShift Container Platform 4.4.3 ose-cluster-policy-controller-container security update
proglottis/gpgme: Use-after-free in GPGME bindings during container image pull
[ "cpe:/a:redhat:openshift:4.4::el7" ]
null
7.5
null
null
RHSA-2023:4212
Red Hat Security Advisory: OpenJDK 8u382 Windows Security Update
OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312)
[ "cpe:/a:redhat:openjdk:1.8::windows" ]
null
3.7
null
null
RHSA-2023:5607
Red Hat Security Advisory: linux-firmware security and enhancement update
hw: amd: Cross-Process Information Leak
[ "cpe:/o:redhat:rhel_eus:9.0::baseos" ]
null
6.5
null
null
RHSA-2012:1238
Red Hat Security Advisory: java-1.6.0-ibm security update
JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment) OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617) OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614) OpenJDK: insecure temporary file permissions (JRE, 7143606) OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872) OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851) JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment) JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment) OpenJDK: insufficient invokespecial <init> verification (HotSpot, 7160757)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2024:5634
Red Hat Security Advisory: podman security update
golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads go-retryablehttp: url might write sensitive information to log file gorilla/schema: Potential memory exhaustion attack due to sparse slice deserialization
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
7.5
null
null
RHSA-2022:0632
Red Hat Security Advisory: unbound security update
unbound: integer overflow in the regional allocator via regional_alloc unbound: integer overflow in sldns_str2wire_dname_buf_origin can lead to an out-of-bounds write unbound: out-of-bounds write in sldns_bget_token_par unbound: assertion failure and denial of service in synth_cname unbound: assertion failure and denial of service in dname_pkt_copy via an invalid packet unbound: integer overflow in a size calculation in dnscrypt/dnscrypt.c unbound: integer overflow in a size calculation in respip/respip.c unbound: infinite loop via a compressed name in dname_pkt_copy unbound: assertion failure via a compressed name in dname_pkt_copy unbound: out-of-bounds write via a compressed name in rdata_copy unbound: symbolic link traversal when writing PID file
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
4.4
null
null
RHSA-2017:0020
Red Hat Security Advisory: gstreamer1-plugins-good security update
gstreamer-plugins-good: Heap buffer overflow in FLIC decoder gstreamer-plugins-good: Heap buffer overflow in FLIC decoder gstreamer-plugins-good: Heap buffer overflow in FLIC decoder gstreamer-plugins-good: Invalid memory read in flx_decode_chunks gstreamer-plugins-good: Heap buffer overflow in FLIC decoder
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.5
null
RHSA-2017:1097
Red Hat Security Advisory: Red Hat JBoss Data Grid 7.1
netty: Infinite loop vulnerability when handling renegotiation using SslProvider.OpenSsl infinispan: auth bypass in REST api
[ "cpe:/a:redhat:jboss_data_grid:7.1" ]
null
null
6.5
null
RHSA-2016:1994
Red Hat Security Advisory: Red Hat OpenShift Enterprise 2.x - 3 Month End Of Life Notice
This is the 3 Month notification for the End of Production Phase 1 of Red Hat OpenShift Enterprise 2.x (2.0, 2.1 and 2.2).
[ "cpe:/a:redhat:openshift:2.0::enterprise" ]
null
null
null
null
RHSA-2024:2729
Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (etcd) security update
golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges. golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads etcd: Incomplete fix for CVE-2023-39325/CVE-2023-44487 in OpenStack Platform
[ "cpe:/a:redhat:openstack:17.1::el9" ]
null
7.5
null
null
RHSA-2020:0445
Red Hat Security Advisory: Red Hat Single Sign-On 7.3.6 security update
xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285) hibernate-validator: safeHTML validator allows XSS jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS jackson-databind: Serialization gadgets in classes of the commons-configuration package jackson-databind: Serialization gadgets in classes of the xalan package jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.* jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource jackson-databind: Serialization gadgets in classes of the ehcache package jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.* keycloak: stored XSS in client settings via application links
[ "cpe:/a:redhat:jboss_single_sign_on:7.3" ]
null
6.1
8.1
null
RHSA-2025:0287
Red Hat Security Advisory: thunderbird security update
firefox: thunderbird: WebChannel APIs susceptible to confused deputy attack firefox: thunderbird: Use-after-free when breaking lines in text firefox: Alt-Svc ALPN validation failure when redirected firefox: Compartment mismatch when parsing JavaScript JSON module firefox: Memory corruption when using JavaScript Text Segmentation firefox: thunderbird: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6 firefox: thunderbird: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.5
null
null
RHSA-2015:0257
Red Hat Security Advisory: samba security update
samba: talloc free on uninitialized stack pointer in netlogon server could lead to remote-code execution
[ "cpe:/a:redhat:storage:2.1:server:el6" ]
null
null
null
null
RHSA-2022:5062
Red Hat Security Advisory: .NET Core 3.1 on RHEL 7 security and bugfix update
dotnet: NuGet Credential leak due to loss of control of third party symbol server domain
[ "cpe:/a:redhat:rhel_dotnet:3.1::el7" ]
null
5
null
null
RHSA-2024:3550
Red Hat Security Advisory: HawtIO 4.0.0 for Red Hat build of Apache Camel 4 Release and security update.
nodejs-ip: arbitrary code execution via the isPublic() function jose4j: denial of service via specially crafted JWE spring-security: Broken Access Control in Spring Security With Direct Use of isFullyAuthenticated follow-redirects: Possible credential leak netty-codec-http: Allocation of Resources Without Limits or Throttling
[ "cpe:/a:redhat:rhboac_hawtio:4.0.0" ]
null
5.3
null
null
RHSA-2024:8683
Red Hat Security Advisory: OpenShift Container Platform 4.16.20 bug fix and security update
dompurify: nesting-based mutation XSS vulnerability
[ "cpe:/a:redhat:openshift:4.16::el9" ]
null
8
null
null
RHSA-2003:312
Red Hat Security Advisory: pan security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2019:4238
Red Hat Security Advisory: chromium-browser security update
chromium-browser: Use after free in Bluetooth chromium-browser: Heap buffer overflow in password manager chromium-browser: Insufficient policy enforcement in WebSockets chromium-browser: Out of bounds write in V8 chromium-browser: Use after free in WebSockets chromium-browser: Type Confusion in V8 chromium-browser: Use after free in WebAudio sqlite: fts3: improve shadow table corruption detection chromium-browser: Out of bounds write in V8 chromium-browser: Integer overflow in PDFium chromium-browser: Insufficient policy enforcement in autocomplete chromium-browser: Insufficient policy enforcement in navigation chromium-browser: Incorrect security UI in Omnibox chromium-browser: Incorrect security UI in sharing chromium-browser: Insufficient validation of untrusted input in Blink chromium-browser: Incorrect security UI in Omnibox chromium-browser: Incorrect security UI in external protocol handling chromium-browser: Insufficient policy enforcement in cookies chromium-browser: Insufficient policy enforcement in audio chromium-browser: Insufficient policy enforcement in Omnibox chromium-browser: Uninitialized Use in rendering chromium-browser: Insufficient policy enforcement in developer tools chromium-browser: Incorrect security UI in Omnibox sqlite: dropping of shadow tables not restricted in defensive mode sqlite: fts3: improve detection of corrupted records sqlite: fts3: improve shadow table corruption detection sqlite: fts3: incorrectly removed corruption check chromium-browser: Insufficient policy enforcement in extensions chromium-browser: Insufficient policy enforcement in extensions chromium-browser: Incorrect security UI in printing chromium-browser: Incorrect security UI in Omnibox chromium-browser: Insufficient policy enforcement in navigation chromium-browser: Incorrect security UI in interstitials chromium-browser: Incorrect security UI in Omnibox chromium-browser: Insufficient policy enforcement in downloads chromium-browser: Insufficient policy enforcement in payments chromium-browser: Type Confusion in V8
[ "cpe:/a:redhat:rhel_extras:6" ]
null
8.8
8.8
null
RHSA-2015:0848
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.0 update
CLI: Insecure default permissions on history file mod_jk: information leak due to incorrect JkMount/JkUnmount directives processing wss4j: Apache WSS4J is vulnerable to Bleichenbacher's attack (incomplete fix for CVE-2011-2487) wss4j: Apache WSS4J doesn't correctly enforce the requireSignedEncryptedDataElements property PicketLink: SP does not take Audience condition of a SAML assertion into account mod_cluster: JavaScript code injection is possible via MCMP mod_manager messages PicketLink: Lack of validation for the Destination attribute in a Response element in a SAML assertion
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el7" ]
null
6.3
null
null
RHSA-2011:0257
Red Hat Security Advisory: subversion security update
(mod_dav_svn): DoS (crash) by processing certain requests to display all available repositories to a web browser Subversion: DoS (memory consumption) by processing blame or log -g requests on certain files
[ "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2004:687
Red Hat Security Advisory: php security update
security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2020:0215
Red Hat Security Advisory: Ansible security and bug fix update (2.9.4)
Ansible: vulnerability in solaris_zone module via crafted solaris zone Ansible: malicious code could craft filename in nxos_file_copy module
[ "cpe:/a:redhat:ansible_engine:2.9::el7", "cpe:/a:redhat:ansible_engine:2.9::el8" ]
null
5.6
7.3
null
RHSA-2010:0581
Red Hat Security Advisory: tomcat5 and tomcat6 security update
tomcat: information leak vulnerability in the handling of 'Transfer-Encoding' header
[ "cpe:/a:redhat:jboss_enterprise_web_server:1::el4", "cpe:/a:redhat:jboss_enterprise_web_server:1::el5" ]
null
null
null
null
RHSA-2014:1833
Red Hat Security Advisory: Red Hat JBoss Enterprise Web Platform 5.2.0 security update
CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix
[ "cpe:/a:redhat:jboss_enterprise_web_platform:5::el4", "cpe:/a:redhat:jboss_enterprise_web_platform:5::el5", "cpe:/a:redhat:jboss_enterprise_web_platform:5::el6" ]
null
null
4.8
null
RHSA-2024:8351
Red Hat Security Advisory: grafana:7.3.6 security update
elliptic: Missing Validation in Elliptic's EDDSA Signature Verification
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
8.2
null
null
RHSA-2015:0623
Red Hat Security Advisory: docker security, bug fix, and enhancement update
docker: Path traversal during processing of absolute symlinks docker: Escalation of privileges during decompression of LZMA archives
[ "cpe:/a:redhat:rhel_extras_other:7" ]
null
null
null
null
RHSA-2022:8645
Red Hat Security Advisory: varnish:6 security update
varnish: Request Forgery Vulnerability
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
7.5
null
null
RHSA-2024:8870
Red Hat Security Advisory: kernel-rt security update
kernel: xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create kernel: gso: do not skip outer ip header in case of ipip and net_failover kernel: dmaengine: fix NULL pointer in channel unregistration function kernel: net/bluetooth: race condition in conn_info_{min,max}_age_set() kernel: netfilter: nf_conntrack_h323: Add protection for bmp length out of range kernel: netfilter: nft_set_pipapo: do not free live element kernel: KVM: Always flush async #PF workqueue when vCPU is being destroyed kernel: netfilter: nft_set_pipapo: walk over current view on netlink dump kernel: nouveau: lock the client object tree. kernel: netfilter: bridge: replace physindev with physinif in nf_bridge_info kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() kernel: dma-direct: Leak pages on dma_set_decrypted() failure kernel: bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq kernel: of: module: add buffer overflow check in of_modalias() kernel: r8169: Fix possible ring buffer corruption on fragmented Tx packets. kernel: net/mlx5e: Fix netif state handling kernel: netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type kernel: drm/i915/dpt: Make DPT object unshrinkable kernel: ipv6: prevent possible NULL deref in fib6_nh_init() kernel: tipc: force a dst refcount before doing decryption kernel: ACPICA: Revert &#34;ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine.&#34; kernel: bpf: Fix overrunning reservations in ringbuf kernel: netfilter: nf_tables: prefer nft_chain_validate kernel: ibmvnic: Add tx check to prevent skb leak kernel: drm/i915/gt: Fix potential UAF by revoke of fence registers kernel: drm/amdgpu: avoid using null object of framebuffer kernel: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers kernel: gfs2: Fix NULL pointer dereference in gfs2_log_flush kernel: USB: serial: mos7840: fix crash on resume kernel: tipc: Return non-zero value from tipc_udp_addr2str() on error kernel: kobject_uevent: Fix OOB access within zap_modalias_env() kernel: dev/parport: fix the array out-of-bounds risk kernel: block: initialize integrity buffer to zero before writing it to media kernel: mlxsw: spectrum_acl_erp: Fix object nesting warning kernel: padata: Fix possible divide-by-0 panic in padata_mt_helper() kernel: memcg: protect concurrent access to mem_cgroup_idr kernel: sctp: Fix null-ptr-deref in reuseport_add_sock(). kernel: bonding: fix xfrm real_dev null pointer dereference kernel: bonding: fix null pointer deref in bond_ipsec_offload_ok kernel: netfilter: flowtable: initialise extack before use kernel: ELF: fix kernel.randomize_va_space double read kernel: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
4.7
null
null
RHSA-2024:6209
Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.4.10 security update
jose-go: improper handling of highly compressed data axios: axios: Server-Side Request Forgery elliptic: nodejs/elliptic: EDDSA signature malleability due to missing signature length check elliptic: nodejs/elliptic: ECDSA signature malleability due to missing checks elliptic: nodejs/elliptic: ECDSA implementation malleability due to BER-enconded signatures being allowed
[ "cpe:/a:redhat:service_mesh:2.4::el8" ]
null
5.3
null
null
RHSA-2023:6251
Red Hat Security Advisory: OpenShift Virtualization 4.11.7 Images security and bug fix update
golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:container_native_virtualization:4.11::el8" ]
null
7.5
null
null
RHSA-2021:3798
Red Hat Security Advisory: openssl security update
openssl: integer overflow in CipherUpdate openssl: NULL pointer dereference in X509_issuer_and_serial_hash()
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
5.9
null
null
RHSA-2024:9150
Red Hat Security Advisory: python-jinja2 security update
jinja2: accepts keys containing non-attribute characters
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.4
null
null
RHSA-2014:1188
Red Hat Security Advisory: python-django-horizon security update
openstack-horizon: multiple XSS flaws openstack-horizon: multiple XSS flaws openstack-horizon: multiple XSS flaws openstack-horizon: persistent XSS in Horizon Host Aggregates interface openstack-horizon: multiple XSS flaws
[ "cpe:/a:redhat:openstack:4::el6" ]
null
null
null
null
RHSA-2022:0988
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (golang-github-vbatts-tar-split) security update
golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet golang: crypto/tls: certificate of wrong type is causing TLS client to panic
[ "cpe:/a:redhat:openstack:16.1::el8" ]
null
6.5
null
null
RHSA-2024:3339
Red Hat Security Advisory: glibc security update
glibc: Out of bounds write in iconv may lead to remote code execution glibc: stack-based buffer overflow in netgroup cache glibc: null pointer dereferences after failed netgroup cache insertion glibc: netgroup cache may terminate daemon on memory allocation failure glibc: netgroup cache assumes NSS callback uses in-buffer strings
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
4
null
null
RHSA-2024:4430
Red Hat Security Advisory: perl-HTTP-Tiny security update
http-tiny: insecure TLS cert default
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
6.8
null
null
RHSA-2024:0131
Red Hat Security Advisory: pixman security update
pixman: Integer overflow in pixman_sample_floor_y leading to heap out-of-bounds write
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7
null
null
RHSA-2024:6973
Red Hat Security Advisory: dovecot security update
dovecot: using a large number of address headers may trigger a denial of service dovecot: very large headers can cause resource exhaustion when parsing message
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
6.8
null
null
RHSA-2023:7388
Red Hat Security Advisory: tigervnc security update
xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
7.8
null
null
RHSA-2020:5500
Red Hat Security Advisory: mariadb:10.3 security, bug fix, and enhancement update
mysql: InnoDB unspecified vulnerability (CPU Oct 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019) mysql: C API unspecified vulnerability (CPU Jan 2020) mysql: C API unspecified vulnerability (CPU Apr 2020) mysql: InnoDB unspecified vulnerability (CPU Apr 2020) mysql: Server: DML unspecified vulnerability (CPU Apr 2020) mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2020) mysql: InnoDB unspecified vulnerability (CPU Apr 2020) mariadb-connector-c: Improper validation of content in a OK packet received from server mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) mysql: InnoDB unspecified vulnerability (CPU Oct 2020) mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) mysql: Server: Locking unspecified vulnerability (CPU Oct 2020) mariadb: Insufficient SST method name check leading to code injection in mysql-wsrep mysql: InnoDB unspecified vulnerability (CPU Jan 2021) mysql: Server: Parser unspecified vulnerability (CPU Apr 2021) mysql: InnoDB unspecified vulnerability (CPU Apr 2021)
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
4.9
4.9
null
RHSA-2018:0528
Red Hat Security Advisory: erlang security update
erlang: TLS server vulnerable to Adaptive Chosen Ciphertext attack allowing plaintext recovery or MITM attack
[ "cpe:/a:redhat:openstack:9::el7" ]
null
null
6.5
null
RHSA-2024:2904
Red Hat Security Advisory: thunderbird security update
Mozilla: Arbitrary JavaScript execution in PDF.js Mozilla: IndexedDB files retained in private browsing mode Mozilla: Potential permissions request bypass via clickjacking Mozilla: Cross-origin responses could be distinguished between script and non-script content-types Mozilla: Use-after-free could occur when printing to PDF Mozilla: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
6.1
null
null
RHSA-2012:1206
Red Hat Security Advisory: python-paste-script security update
python-paste-script: Supplementary groups not dropped when started an application with "paster serve" as root
[ "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2020:1172
Red Hat Security Advisory: qt security update
qt5-qtbase: Double free in QXmlStreamReader qt5-qtsvg: Invalid parsing of malformed url reference resulting in a denial of service qt5-qtbase: QImage allocation failure in qgifhandler qt5-qtimageformats: QTgaFile CPU exhaustion qt: Malformed PPM image causing division by zero and crash in qppmhandler.cpp qt5-qtbase: QBmpHandler segmentation fault on malformed BMP file
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
3.3
null
RHSA-2011:1580
Red Hat Security Advisory: resource-agents security, bug fix, and enhancement update
rgmanager: insecure library loading vulnerability
[ "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2023:3910
Red Hat Security Advisory: Red Hat OpenShift Enterprise security update
golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests openshift: OCP & FIPS mode golang: html/template: improper handling of JavaScript whitespace
[ "cpe:/a:redhat:openshift:4.10::el7", "cpe:/a:redhat:openshift:4.10::el8" ]
null
8.1
null
null
RHSA-2024:4006
Red Hat Security Advisory: OpenShift Container Platform 4.12.60 bug fix and security update
graphql-go: Denial of service via stack overflow panics golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS jose-go: improper handling of highly compressed data
[ "cpe:/a:redhat:openshift:4.12::el8", "cpe:/a:redhat:openshift:4.12::el9" ]
null
4.3
null
null
RHSA-2009:1200
Red Hat Security Advisory: java-1.6.0-sun security update
xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass OpenJDK information leaks in mutable variables (6588003,6656586,6656610,6656625,6657133,6657619,6657625,6657695,6660049,6660539,6813167) OpenJDK OpenType checks can be bypassed (6736293) JDK: XML parsing Denial-Of-Service (6845701) OpenJDK Untrusted applet System properties access (6738524) OpenJDK Proxy mechanism information leaks (6801071) OpenJDK Proxy mechanism information leaks (6801071) OpenJDK proxy mechanism allows non-authorized socket connections (6801497) Java Web Start Buffer JPEG processing integer overflow (6823373) Java Web Start Buffer unpack200 processing integer overflow (6830335) JRE applet launcher vulnerability OpenJDK private variable information disclosure (6777487) JDK improper version selection JDK reposition of untrusted applet security icon in X11 JDK DoS with crafted .jnlp file JDK DoS with Swing Synthcontext implementation
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2015:1976
Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update
kernel: fs: deadlock due to incorrect usage of rename_lock
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
null
null
RHSA-2019:1485
Red Hat Security Advisory: kernel security and bug fix update
Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service
[ "cpe:/o:redhat:rhel_aus:7.2::server", "cpe:/o:redhat:rhel_e4s:7.2::server", "cpe:/o:redhat:rhel_tus:7.2::server" ]
null
null
5.3
null
RHSA-2024:8428
Red Hat Security Advisory: OpenShift Container Platform 4.15.37 packages and security update
Podman: Buildah: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library Podman: Buildah: CRI-O: symlink traversal vulnerability in the containers/storage library can cause Denial of Service (DoS) go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion
[ "cpe:/a:redhat:openshift:4.15::el8", "cpe:/a:redhat:openshift:4.15::el9" ]
null
5.9
null
null
RHBA-2024:11565
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.15.42 packages update
libreswan: Regression of CVE-2023-30570 fixes in the Red Hat Enterprise Linux libreswan: remote DoS via crafted TS payload with an incorrect selector length libreswan: Malicious IKEv1 Aggressive Mode packets can crash libreswan libreswan: Invalid IKEv2 REKEY proposal causes restart libreswan: Invalid IKEv1 Quick Mode ID causes restart libreswan: Invalid IKEv1 repeat IKE SA delete causes crash and restart libreswan: Missing PreSharedKey for connection can cause crash libreswan: IKEv1 default AH/ESP responder can crash and restart
[ "cpe:/a:redhat:openshift:4.15::el9" ]
null
6.5
null
null
RHSA-2017:3402
Red Hat Security Advisory: postgresql security update
postgresql: Start scripts permit database administrator to modify root-owned files postgresql: Start scripts permit database administrator to modify root-owned files
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.5
null
RHSA-2019:3203
Red Hat Security Advisory: Ansible security and bug fix update
ansible: secrets disclosed on logs when no_log enabled ansible: Incomplete fix for CVE-2019-10206 ansible: sub parameters marked as no_log are not masked in certain failure scenarios
[ "cpe:/a:redhat:ansible_engine:2.8::el7", "cpe:/a:redhat:ansible_engine:2.8::el8" ]
null
5
6.4
null
RHSA-2020:0740
Red Hat Security Advisory: kernel-alt security and bug fix update
kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence kernel: Heap address information leak while using L2CAP_GET_CONF_OPT kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP kernel: sensitive information disclosure from kernel stack memory via HIDPCONNADD command kernel: powerpc: local user can read vector registers of other users' processes via a Facility Unavailable exception kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
4.4
7.3
null
RHSA-2021:2046
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.7 security update on RHEL 6
velocity: arbitrary code execution when attacker is able to modify templates netty: Information disclosure via the local system temporary directory netty: possible request smuggling in HTTP/2 due missing validation
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6" ]
null
5.9
null
null
RHSA-2021:0155
Red Hat Security Advisory: dnsmasq security update
dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker
[ "cpe:/o:redhat:rhel_eus:7.6::computenode", "cpe:/o:redhat:rhel_eus:7.6::server" ]
null
4
null
null
RHSA-2024:4267
Red Hat Security Advisory: fontforge security update
fontforge: command injection via crafted filenames fontforge: command injection via crafted archives or compressed files
[ "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
4.2
null
null
RHSA-2016:1625
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP 2.4.6 Service Pack 1 security update
HTTPD: sets environmental variable based on user supplied Proxy request header
[ "cpe:/a:redhat:jboss_core_services:1" ]
null
null
5
null
RHSA-2023:7038
Red Hat Security Advisory: flatpak security, bug fix, and enhancement update
flatpak: TIOCLINUX can send commands outside sandbox if running on a virtual console flatpak: Metadata with ANSI control codes can cause misleading terminal output
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
6.2
null
null
RHSA-2012:1483
Red Hat Security Advisory: thunderbird security update
Mozilla: evalInSanbox location context incorrectly applied (MFSA 2012-93) Mozilla: Buffer overflow while rendering GIF images (MFSA 2012-92) Mozilla: Improper character decoding in HZ-GB-2312 charset (MFSA 2012-101) Mozilla: Frames can shadow top.location (MFSA 2012-103) Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2012-105) Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2012-105) Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2012-105) Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2012-105) Mozilla: Use-after-free, buffer overflow, and memory corruption issues found using Address Sanitizer (MFSA 2012-106) Mozilla: Use-after-free, buffer overflow, and memory corruption issues found using Address Sanitizer (MFSA 2012-106) Mozilla: Use-after-free, buffer overflow, and memory corruption issues found using Address Sanitizer (MFSA 2012-106) Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2012-105) Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2012-105) Mozilla: Improper security filtering for cross-origin wrappers (MFSA 2012-100) Mozilla: Miscellaneous memory safety hazards (rv:10.0.11) (MFSA 2012-91)
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2020:1715
Red Hat Security Advisory: dnsmasq security, bug fix, and enhancement update
dnsmasq: memory leak in the create_helper() function in /src/helper.c
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
3.7
null